-
PCI DSS questions: Should full credit card numbers be on a receipt?
Are merchants that fall under PCI DSS allowed to print full credit card numbers on a receipt? Learn more in this response from security management expert David Mortman.30 Nov 2009
-
How to find and remove keyloggers and prevent spyware installation
Keep keyloggers from stealing your users' passwords by learning how to find and remove keyloggers, as well as how to prevent spyware installation in the first place, from IAM expert Randall Gamby.30 Nov 2009
-
IBM to acquire database security firm Guardium
Deal reportedly worth $225 million.30 Nov 2009
-
How to secure a .pdf file
In this expert Q&A, Michael Cobb explains how to avoid malicious content that is embedded into .pdf documents.29 Nov 2009
-
How do hackers bypass a code signing procedure to inject malware
In this expert Q&A, Michael Cobb reveals how malicious applications can actually be approved by Symbian's Express Signing procedure.29 Nov 2009
-
What patch management metrics does Project Quant use?
In this Q&A, expert Michael Cobb reviews the open patch management metrics model called Project Quant.29 Nov 2009
-
Top spammer gets four years in jail for stock fraud scheme
Alan Ralsky, the self-proclaimed "Godfather of Spam," was jailed for his role in a stock fraud spam scheme.27 Nov 2009
-
Health Net breach failure of security policy, technology
Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them.27 Nov 2009
-
onboarding and offboarding
In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the ...24 Nov 2009
-
Screencast: Find rogue wireless access points with Vistumbler
Peter Giannoulis of TheAcademyHome.com and TheAcademyPro.com explains how to use the basic features of the free Vistumbler tool.24 Nov 2009
-
Cost of security, IT management add up at healthcare facilities, study finds
Digitalizing healthcare records and new health systems fail to cut costs, according to new research from Harvard University. Security and other management costs add up.24 Nov 2009
-
Quiz: Compliance-driven role management
Use this five-question quiz to test your knowledge of role and entitlement management.23 Nov 2009
-
PCI DSS compliance help: Using frameworks, technology to aid efforts
This mini-guide offers a variety of tips and information on how organizations can use several frameworks, technologies and standards, such as tokenization, ISO 27002, Secure Hashing Algorithm and o...23 Nov 2009
-
Exploit code targets Internet Explorer zero-day display flaw
Exploit code is publically available targeting an Internet Explorer cascading style sheet (CSS) handling error, according to Symantec.23 Nov 2009
-
How to protect distributed information flows
In a book excerpt from "The Shortcut Guide to Prioritizing Security Spending," author Dan Sullivan explains how to get a handle on enterprise data that may be moving around the globe.22 Nov 2009
-
Identity lifecycle management for security and compliance
Enterprise identities and their associated roles need to be provisioned for access to a variety of services and systems around the organization. In many cases, the entitlements provided to these va...20 Nov 2009
-
Quiz: How to build secure applications
Use this five-question quiz to test your knowledge of how to secure your enterprise apps.19 Nov 2009
-
Hackers to sharpen malware, malicious software in 2010
Symantec researchers predict an increase in attacks using social network architectures, third-party applications and URL shortening services.19 Nov 2009
-
Health Net healthcare data breach affects1.5 million
A lost hard drive contained seven years of patient data including Social Security numbers and medical records of more than a million Health Net customers.19 Nov 2009
-
Black box and white box testing: Which is best?
There's no question that testing application security is essential for enterprises, but which is better: black box security testing or white box security testing? Learn more in this expert tip.18 Nov 2009
Security Management Strategies for the CIO